Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer security 250
- Security measures 231
- Computer networks 192
- Penetration testing (Computer security) 109
- Hackers 82
- Engineering & Applied Sciences 72
- Computer crimes 48
- Computer Science 44
- Hacking 43
- Internet 37
- Data protection 35
- Operating systems (Computers) 30
- Electrical & Computer Engineering 29
- Examinations 29
- Certification 27
- Prevention 27
- Kali Linux 26
- Telecommunications 26
- Computer hackers 24
- Electronic data processing personnel 24
- Computers 22
- Development 22
- Application software 20
- Information technology 19
- Management 19
- Linux 18
- Access control 17
- Web sites 17
- Computer software 16
- Microsoft Windows (Computer file) 15
-
361
-
362
-
363
-
364Publicado 2007Tabla de Contenidos: “…Tendencias y dificultades / Jordi Barba -- Hacia una ética dialógica en la empresa / Alberto Revenga -- Ética hacker y empresa: el reto de las TIC en los valores de empresa / Ramon Alcoberro…”
Libro -
365Publicado 2007Tabla de Contenidos: “…Tendencias y dificultades / Jordi Barba -- Hacia una ética dialógica en la empresa / Alberto Revenga -- Ética hacker y empresa: el reto de las TIC en los valores de empresa / Ramon Alcoberro…”
991002482629706719 -
366por Ayala, Luis. authorTabla de Contenidos: “…Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template…”
Publicado 2016
Libro electrónico -
367
-
368Publicado 2004Tabla de Contenidos: “…An attack on the telephone network -- An attack on an ISP -- If he had just paid the rent -- Inside a hacker sting operation ... -- Identity theft -- Let's ask the hackers ... -- Why do hackers hack? …”
Libro electrónico -
369
-
370por Wang, WallyTabla de Contenidos: “…Acknowledgments; Brief Contents; Contents in Detail; Introduction; PART 1: The Early Hackers; 1: The Hacker Mentality; Questioning Authority; Questioning Assumptions; Developing Values; The Three Stages of Hacking; 2: The First Hackers: The Phone Phreakers; A Short History of Phone Phreaking; Phone Phreaking Urban Legends; True and Verified Phone Phreaking Stories; Phone Phreaking Tools and Techniques; 3: Hacking People, Places, and Things; Social Engineering: The Art of Hacking People; Picking Locks; Exploring Urban Areas; Hacking the Airwaves; Hacking History (or, Hemp for Victory)…”
Publicado 2006
Libro electrónico -
371por Raymond, Eric S.Tabla de Contenidos: “…Appendix A. How to Become a HackerWhy This Document?; What Is a Hacker?; The Hacker Attitude; Basic Hacking Skills; Status in the Hacker Culture; The Hacker/Nerd Connection; Points for Style; Other Resources; Frequently Asked Questions; Appendix B. …”
Publicado 2001
Libro electrónico -
372
-
373
-
374
-
375por Carr, JeffreyTabla de Contenidos: “…Assessing the problem -- The rise of the non-state hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Non-state hackers and the social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policy makers from the field -- Afterword…”
Publicado 2010
Libro electrónico -
376
-
377por Ayala, Luis. authorTabla de Contenidos: “…Chapter 1: Hacker Reconnaissance of a Hospital Network -- Chapter 2: How Hackers Gain Access to a Hospital Network -- Chapter 3: Active Medical Device Cyber-Attacks -- Chapter 4: Medical Facility Cyber-Physical Attacks -- Chapter 5: Hospital Insider Threat -- Chapter 6: Detection of Cyber-Attacks -- Chapter 7: Preventing Cyber-Attacks -- Chapter 8: Cyber-Attack Response and Recovery Planning -- Chapter 9: Appendix. …”
Publicado 2016
Libro electrónico -
378
-
379Publicado 2015“…Master the tactics and tools of the advanced persistent threat hacker In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. …”
Libro electrónico -
380por Sheetz, MichaelTabla de Contenidos: “…A definition of computer forensics -- Introduction -- Forensic science -- The history of computer forensics -- The world wide web -- The hacker community -- Conclusion -- Basic of computer forensic concepts -- Introduction -- Understanding digital evidence -- Storage -- Processing -- What is computer data? …”
Publicado 2007
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico